Control #
F
2
.
2
Log technical misuse attempts and review prompt logs quarterly
Log prompts and completions related to technical misuse, including exploit code and abuse-enabling tactics. Conduct quarterly reviews to identify patterns and update defenses.
Evidence
We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.
Recommended actions
We'll recommend specific practices and actions for complying with this control.